Cyber Security Plan Step 1: IT Inventory Management

Feb 7, 2019 12:21:34 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Identify and Manage All Hardware and Software on Your Network

As we’ve been discussing, protecting your IT network from online threats requires a cyber security plan. Arguably, the first step in that plan is to identify and inventory all of the hardware and software on the network. This is critical to IT inventory management -- an ongoing, multi-step effort to make sure every element of the network has up-to-date protection against vulnerabilities. It is considered a best practice for regulated entities. This post will outline key issues of inventory management beginning with why it’s so important.

Read More

A New Guide to Microsoft Office 365 Security and Compliance: Don’t Be Your Own Worst Enemy

Jan 22, 2019 1:49:13 PM / by STG Blogger posted in cyber security

0 Comments

End Unintended Consequences of Improper Set-up, Lacks in Monitoring and Cyber Security Training

We’re pleased to introduce our new – and complimentary – Guide to Microsoft Office 365 Security and Compliance.

As a Microsoft Office 365 partner, it was important to us to create this guide. Many of our clients are in regulated industries and have legal compliance concerns. We confidently provide many of them with Office 365. Not only is it a powerful productivity tool, but also Microsoft seriously addresses security in its products.

Read More

Software Patch Management Best Practices: A Key Part of Your Cyber Security Program

Jan 4, 2019 2:18:01 PM / by Eric Benda, CEO posted in cyber security

0 Comments

Security Updates Must Go Beyond Your Operating System to 3rd Party Software, Apps

Many of our clients are regulated entities in financial services and healthcare. In our ongoing concern for their cyber security in the face of increasing and evolving threats from individual and nation state bad actors, patching security vulnerabilities in software and applications is an integral part of every cyber security program we implement. Because many companies believe that their Microsoft and Apple security updates have them covered, this post shares some additional software patch management best practices.

Read More

Encrypted Email Services: Know What You're Getting

Dec 19, 2018 8:55:00 AM / by Eric Benda, CEO posted in Email encryption

0 Comments

The ‘Encryption Myth’ May Open Regulated Businesses to Added Security and Compliance Risk

This post is motivated by the growing number of inquiries we’re receiving from clients about whether they should be using one of the cloud-based email encryption services available today from companies including Citrix, Sharefile, Smarsh, AppRiver and others. Many of our clients are in regulated industries -- financial services and healthcare.

Read More

Cyber Security Training: How to Phish-proof Your Employees

Nov 26, 2018 9:00:00 AM / by Liege Payne posted in cyber security, Security, phishing

0 Comments

Drastically Reduce Vulnerabilities in Only 90 Days

Continuing our discussion of cyber security training for employees of regulated organizations, this post examines the growing threats from phishing schemes and suggests training that will reduce the possibility that your staff will inadvertently unleash a disastrous attack on your systems, data and client assets.

Read More

Cyber Security Training for Employees: Protecting New Personal Devices

Nov 7, 2018 8:42:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Don't Let Their Holiday Technology Gifts Become 'Gifts' for Hackers

Our last post discussed the importance of cyber security training for employees. Along those lines, at holiday time we always make sure to alert our customers and their staffs to a particular concern: devices received as personal gifts that will also be used for business. If they’re not set up according to best practices by your network security team, they could represent a serious cyber security threat and compliance problem for your regulated business.

Read More

Is AI Snooping On Your Office Conversations? Cyber Security Training Can Keep Them Confidential

Oct 11, 2018 5:53:03 PM / by Eric Benda, CEO posted in cyber security

2 Comments

Take Action Before Letting Alexa, Siri and Bixby Into Your Private Meetings!

Are our artificial intelligence devices listening to us all the time and saving our conversations? The fact is, we just don’t know. Although most of the alarm has centered around home use of these devices, it’s time that we consider the potential negative implications on data security and privacy in the workplace – especially as regards regulated businesses. So what do we know?

Read More

Recent DOJ Hacker Charges a Reminder: Do Network Penetration Testing, Patching for Cyber Security

Sep 27, 2018 8:30:00 AM / by Eric Benda, CEO posted in assessment, cyber security, penetration testing

0 Comments

Earlier this month, the U.S. Department of Justice filed charges against a N. Korean hacker who they say was behind such infamous incidents as the WannaCry ransomware attack, the attack on SONY over its release of a film unfavorable to N. Korean leader Kim Jung Un, and the $81 million Bangladesh Bank heist.

The DOJ’s action is a reminder that businesses are vulnerable and must take proactive steps to assure cyber security – especially regulated companies. These steps include network penetration testing, ongoing identification and patching of software and network vulnerabilities and other measures.

Read More

Get Our Cyber Security Self-Assessment Checklist

Sep 25, 2018 12:26:43 PM / by Eric Benda, CEO posted in cyber security, Security, IT Support, assessment

0 Comments

Another Free Tool to Defend Against Hacker Threats

Here at Soundshore Technology Group we are increasingly focused on cyber security. We’ve just launched a second tool – a Cyber Security Self-Assessment Checklist -- that companies can download for free to help them look in the right places and ask the right questions to assure their networks and systems are defended. This follows a special offer for new and prospective customers that we launched a few weeks ago – a free external Cyber Security Vulnerability Assessment, a process that we perform.

Read More

Special Offer: Free Cyber Security Vulnerability Assessment Available to New STG Customers

Jul 30, 2018 3:50:44 PM / by Eric Benda, CEO posted in cyber security, Security, IT Support, assessment

0 Comments

External Scan Is First Step to Protecting Financial Firms’ Client Data/Assets, Enhancing Reputation

We’re introducing an important offer for new and prospective customers – a complimentary Cyber Security Network Vulnerability Assessment. This offer addresses the critical need for financial services companies to be able to demonstrate proactive efforts to assure the security of their technology networks. Read on to learn why we’ve decided to do this and to get more details about the offer.

Read More